This five-part series provides an introductory roadmap to the California Consumer Privacy Act’s (CCPA) new cybersecurity audit requirement and the California Privacy Protection Agency’s (CalPrivacy) implementing regulations.

Across the series, we outline the core elements of the audit requirement, discuss practical considerations for designing and operating an audit program, and explore how these audits intersect with existing security frameworks, regulatory enforcement, and litigation risk. The goal is to help businesses operationalize CalPrivacy’s cybersecurity audit requirements in a practical way that accounts for existing obligations, constraints, and risk‑management processes, while also giving organizations an opportunity to “see around the corner” and avoid inadvertently increasing legal risk.

The series will proceed as follows:

  • Part 2 – The How of CCPA Cyber Audits: Operationalizing the Requirements. How covered businesses can design and run a workable audit program in practice, including data-driven scoping around California personal information and sensitive information, structuring auditor independence, and core evidence and governance considerations.
  • Part 3 – Where CCPA Cyber Audits Fit Within Existing Security Frameworks. How CalPrivacy audit requirements intersect with existing cybersecurity and risk frameworks (for example, the NIST Cybersecurity Framework) and other “reasonable security” obligations, and how organizations can leverage existing assessments to minimize duplication.
  • Part 4 – Whose Name Is on the Line: Enforcement and Accountability. How CalPrivacy may use audit reports, certifications, and related materials in investigations and enforcement, and what the regime may mean for organizational governance and potential exposure for senior leadership.
  • Part 5 – Why CCPA Audits Matter for Litigation. How audit reports and certifications are likely to surface in data breach and class action litigation, and ways to structure audit and documentation practices with that litigation risk in mind.

At the conclusion of the series, Troutman Pepper Locke plans to host a webinar on CalPrivacy’s cybersecurity audit. Registration information will be circulated at a later date.

I. Regulatory Background: CCPA, CalPrivacy, and Cybersecurity Audits

The CCPA, as amended by the California Privacy Rights Act (CPRA), is California’s comprehensive consumer privacy law. It grants California residents certain rights over their personal information and imposes obligations on regulated “businesses.”

The CPRA created CalPrivacy to serve as California’s dedicated privacy regulator. It is an independent enforcement and rulemaking body responsible for issuing regulations that interpret and operationalize the CCPA and for investigating potential violations.

With respect to cybersecurity audits, the CCPA directed CalPrivacy to issue regulations (1) requiring businesses whose processing of consumers’ personal information presents a “significant risk” to consumers’ privacy and security to perform a cybersecurity audit on an annual basis and (2) establishing a process to ensure that those audits are thorough and independent. In determining when processing of personal information may result in significant risk to consumers’ privacy and security, CalPrivacy was required to consider “the size and complexity of the business and the nature and scope of processing activities” — language that closely tracks similar phrases in cybersecurity frameworks describing factors businesses should weigh when designing and maintaining risk-based information security programs.

Pursuant to that mandate, CalPrivacy finalized a package of regulations addressing, among other things, the new cybersecurity audit requirements. Those regulations were approved by the Office of Administrative Law in September 2025 and became effective January 1, 2026.

II. Who Is Required to Complete CCPA Cybersecurity Audits?

To be subject to the CCPA’s cybersecurity audit requirement, an organization must:

  1. Meet the statutory definition of a “business” under the CCPA; and
  1. Engage in processing of personal information that the CCPA deems to present “significant risk” under its thresholds.

Accordingly, not every CCPA-covered business will be required to undergo an annual cybersecurity audit — only those that satisfy the “significant risk” criteria.

The “significant risk” analysis considers three factors: (1) the nature of the processing the business is engaged in; (2) the business’s annual revenue; and (3) the volume of personal and sensitive personal information processed. More specifically:

  1. If a business derives 50% or more of its annual revenue from selling or sharing personal information, that alone triggers the audit obligation — no other thresholds need to be met.
  2. The audit requirement also applies if the business had more than $26.625 million in annual gross revenue in the preceding calendar year and, during that same year, either (i) processed the personal information of 250,000 or more consumers or households, or (ii) processed the “sensitive personal information” (defined by the CCPA and modified in the regulations) of 50,000 or more consumers.

Although CalPrivacy frames these audits as targeting “significant risk” processing, the thresholds are likely to capture many businesses that do not see themselves as “high risk” from a breach or harm perspective. This includes companies that process even modest volumes of relatively low‑risk data, such as name, address, and other basic contact information. For example, the 250,000-consumer threshold represents less than 1% of California’s population (so it is not as high as it seems) and includes not just consumer data, but also business contacts and employees whose personal information is processed.

During the 45‑day comment period, stakeholders urged CalPrivacy to narrow the audit scope to align it more closely with actual risk of harm and statutory language, rather than relying on the mere processing of modest volumes of personal information (which is broadly defined under the CCPA), as the primary triggers. Stakeholders pointed to California’s data breach notification statute, which is limited to specific data elements that the legislature has deemed likely to cause harm if compromised. CalPrivacy responded that “the CCPA requires [CalPrivacy] to consider the size and complexity of the business, and the nature and scope of its processing activities, in determining whether a business’s processing of consumers’ personal information presents a significant risk to consumers’ security,” and that the thresholds appropriately reflect risk. While this language aligns with other security frameworks and the CCPA’s text, in practice, it treats selling/sharing or modest‑scale processing as a proxy for complexity and risk — even where the underlying data at issue (returning to the name and basic contact information example), if exposed, may not plausibly cause harm.

Practically, if CalPrivacy’s thresholds are met, a business must complete a thorough, independent cybersecurity audit. As a result, even businesses that have not traditionally viewed themselves as posing “significant risk” will need to assess carefully whether they fall within scope and be prepared to comply with the audit requirements.

The following decision table provides a high-level summary of when the CCPA’s cybersecurity audit requirement is triggered. It translates the statutory thresholds into a set of simple conditions, allowing businesses to compare their own characteristics (e.g., revenue, data volumes, and data use) against the criteria in each row. The table is intended as an overview only; key concepts such as “business,” “sell,” “share,” and “sensitive personal information” are defined terms under the CCPA and should be interpreted consistent with those definitions.

Scenario No.Business CharacteristicsCybersecurity Audit Obligation
1Entity does not meet the statutory definition of a “business” under the CCPA.No audit requirement.
2Entity is a CCPA “business” and derives 50% or more of its annual revenue from selling or sharing personal information.Audit required.
3Entity is a CCPA “business,” had more than $26.625 million in annual gross revenue in the preceding calendar year, and during that same year processed the personal information of 250,000 or more consumers or households.Audit required.
4Entity is a CCPA “business,” had more than $26.625 million in annual gross revenue in the preceding calendar year, and during that same year processed the sensitive personal information of 50,000 or more consumers.Audit required.
5Entity is a CCPA “business” but does not meet any of the thresholds described in Scenarios 2–4.No audit requirement.

III. My Business Is Covered – Now What?

Businesses that meet the regulatory thresholds for cybersecurity audits must conduct audits that evaluate the design and effectiveness of their cybersecurity programs. The regulations define cybersecurity programs as the policies, procedures, and practices that protect personal information from unauthorized access, destruction, use, modification, or disclosure, and protect against unauthorized activity that results in the loss of personal information. A key point, which was confirmed by CalPrivacy’s responses to comments submitted during the 45‑day comment period, is that the regulations do not mandate any specific security controls or technologies. Instead, they explain how businesses must conduct independent, thorough audits that assess how the program protects personal information against unauthorized access, use, alteration, disclosure, destruction, and loss of availability. The audit should also examine how the program operates in practice, including the business’s written policies and procedures and the enforcement of compliance with those requirements.

Scoping what must be included in a CCPA cybersecurity audit will be a complex exercise, and we will explore this in greater depth in Part 2. CalPrivacy has explicitly stated in its rulemaking comments that the CCPA’s existing exemptions remain in play for purposes of the cybersecurity audit, including exemptions for GLBA‑regulated data and FCRA data — meaning those categories of information generally fall outside the audit requirement. At the same time, some information that companies might not normally think of as part of their “cybersecurity program” will still have to be included in a CCPA cybersecurity audit because the CCPA applies to it — even in situations where other state privacy laws might not. This can include, for example, certain information about business contacts (like employees of customers or vendors) and employees, which organizations may not historically treat as part of their core cybersecurity program.

A. Initial and Annual Cybersecurity Audits

Businesses subject to the audit requirement must complete an initial cybersecurity audit. Earlier drafts of the regulations would have required all covered businesses to do so within two years of January 1, 2026, but in response to comments, CalPrivacy adopted a three‑year phased implementation schedule and simplified certification requirements. Now, larger businesses must certify first, with smaller entities following in later years.

Below is a breakdown of the three‑year phased schedule:

GroupThreshold Initial Audit PeriodInitial Audit Report Due
1If annual gross revenue for 2026 was more than $100 million as of January 1, 2027January 1, 2027 – January 1, 2028April 1, 2028
2If annual gross revenue for 2027 was between $50 million and $100 million as of January 1, 2028January 1, 2028 – January 1, 2029April 1, 2029
3If annual gross revenue for 2028 was less than $50 million as of January 1, 2029January 1, 2029 – January 1, 2030April 1, 2030

Each annual audit must cover the 12‑month period, and the audit report for that period must be completed by April 1 of the following year.

B. Independence of the Auditor

Audits are to be conducted by a qualified, objective, independent professional using procedures and standards accepted in the auditing profession. Importantly, the auditor may be either internal or external to the business. However, even an internal auditor should be able to exercise objective and impartial judgment on issues within the scope of the audit, should be free from improper influence by the business being audited, and should not participate in the business activities that the auditor may be required to assess (i.e., a business’s auditor should not be “grading its own homework”).

C. Thoroughness and Evidence Requirements

The regulations also outline expectations regarding the thoroughness of the audit. For example, businesses are tasked with making information in their possession that is relevant to the audit available to the auditor and making a good‑faith effort to disclose relevant facts.

The regulations also clarify that audits should not depend solely on management assertions or attestations. Instead, audits should rely primarily on specific evidence, which may include documents and records, sampling and testing, interviews, and other corroborating materials.

D. Scope of the Cybersecurity Audit

The regulations identify 18 components of a cybersecurity program that may need to be evaluated, to the extent they are applicable to the business’ information systems. CalPrivacy has been explicit that these components are not prescriptive controls that every business must adopt. Rather, the audit must assess those components that are actually applicable to the particular business and its environment. This approach is significant because it continues to reflect a risk‑based model of cybersecurity, consistent with frameworks like NIST CSF and CIS 18: what is “reasonable” depends on factors such as the organization’s size, the nature and volume of the data it processes, the complexity of its systems, and the resources it has available. Importantly, a business may utilize a cybersecurity audit, assessment, or evaluation that it has prepared for another purpose, provided that it meets all the requirements of the regulations either on its own or through supplementation.

E. Executive Management Involvement

Reinforcing the theme that security is not just “security’s” problem, the regulations make clear that audits cannot live and die within compliance or technical teams. Audit reports are to be provided to a member of the business’ executive management team who has direct responsibility for the cybersecurity program, has sufficient knowledge of the audit, and is authorized to submit the certification. In line with the broader push for greater executive (and sometimes board‑level) involvement, the apparent aim is to ensure that senior leadership is informed about cybersecurity risks, program gaps, and remediation plans, and is positioned to make related resourcing and strategic decisions.

F. Retention of Audit Materials

Both the business and the auditor are to retain documents relevant to each cybersecurity audit for five years after the audit is completed. This retention requirement is designed to support potential future regulatory inquiries, enforcement actions, or follow‑on audits that may need to reference prior findings, methodologies, or remediation efforts.

G. Contents of the Cybersecurity Audit Report

The regulations specify in detail what the written cybersecurity audit report must contain. For example, the report should describe the business’s information systems and identify the components of the cybersecurity program that were evaluated. It should also identify and describe any gaps or weaknesses in the program, document the plans to address those issues, and note any corrections or amendments to prior cybersecurity audit reports.

The report should also identify up to three qualified individuals responsible for the business’s cybersecurity program. It should include the auditor’s name, affiliation, and relevant qualifications. In addition, the highest‑ranking auditor must sign a statement affirming that they completed an independent and thorough review in accordance with the regulatory requirements.

If the business issued any data breach notification letters during the relevant calendar year, the report should either attach those letters or provide a description of the notices. If the business was required to notify any California regulator of a breach, the report should include relevant information regarding that regulatory notice, as well.

H. Certificate of Completion

For each calendar year in which a business is required to conduct a cybersecurity audit, it must submit a written certification of completion to CalPrivacy confirming completion of the audit by April of the following year. That certification must be signed under penalty of perjury by a member of the executive management team who is directly responsible for cybersecurity‑audit compliance, has sufficient knowledge of the audit to provide accurate information, and has authority to submit the certification on the business’s behalf.

Importantly, the audit report itself is not automatically filed with CalPrivacy. CalPrivacy can, however, request or subpoena the report in connection with an investigation or enforcement action. As a result, businesses should operate on the assumption that their audit records, including the report, supporting evidence, and internal communications around the process, could later be scrutinized by regulators, or potentially become discoverable in litigation.

Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Kaitlin Clemens Kaitlin Clemens

Kaitlin brings a wealth of knowledge and a proven track record in managing complex legal challenges to clients in a wide range of industries. Her diverse background spans cybersecurity, data privacy, and complex litigation, including leading cybersecurity incident response teams, advising on compliance…

Kaitlin brings a wealth of knowledge and a proven track record in managing complex legal challenges to clients in a wide range of industries. Her diverse background spans cybersecurity, data privacy, and complex litigation, including leading cybersecurity incident response teams, advising on compliance issues, and coordinating with international counsel.

Photo of Karla Ballesteros Karla Ballesteros

Karla is an associate in the firm’s Privacy + Cyber practice. Her daily work includes counseling insureds on the initial incident response, potential ransom payment, restoration, data mining, and notification segments of the incident response practice. She also leads efforts to identifying and…

Karla is an associate in the firm’s Privacy + Cyber practice. Her daily work includes counseling insureds on the initial incident response, potential ransom payment, restoration, data mining, and notification segments of the incident response practice. She also leads efforts to identifying and remediating shortcomings in cybersecurity and privacy practices of firm clients.

Photo of Bianca Nalaschi Bianca Nalaschi

Bianca brings extensive experience in data privacy, cybersecurity, and litigation. She develops incident response strategies tailored to unique client objectives, coordinates with third-party experts to determine the nature and scope of cybersecurity events, and counsels clients on compliance with state, federal, international, and…

Bianca brings extensive experience in data privacy, cybersecurity, and litigation. She develops incident response strategies tailored to unique client objectives, coordinates with third-party experts to determine the nature and scope of cybersecurity events, and counsels clients on compliance with state, federal, international, and contractual legal obligations. Bianca has represented clients in third-party liability actions, from pre-suit through case resolution.

Photo of Edgar Vargas Edgar Vargas

Edgar is a Certified Information Privacy Professional (CIPP/US). He assists clients on compliance and litigation issues, including issues regarding privacy and cybersecurity laws. He is fluent in Spanish, allowing him to effectively communicate with and serve Spanish speaking clients.

Photo of Esther Kye Esther Kye

Esther is an associate in the firm’s Privacy + Cyber practice. She received her J.D. from the University of California, Irvine School of Law where she served as a representative of the Asian Pacific American Women Lawyers Alliance, the Orange County Korean American…

Esther is an associate in the firm’s Privacy + Cyber practice. She received her J.D. from the University of California, Irvine School of Law where she served as a representative of the Asian Pacific American Women Lawyers Alliance, the Orange County Korean American Bar Association, and as pro bono chair of the Asian Pacific American Law Students Association.

Photo of Karimah Lee Karimah Lee

Karimah represents clients in consumer financial services law, business disputes, and complex commercial litigation in federal and state courts.

Photo of Jennifer Brumfield Jennifer Brumfield

Jennifer is a litigator on the Privacy + Cyber team. She represents clients in complex cybersecurity and privacy class actions — including cases that involve emerging legal questions related to jurisdiction and standing — and manages all phases of litigation from case assessment…

Jennifer is a litigator on the Privacy + Cyber team. She represents clients in complex cybersecurity and privacy class actions — including cases that involve emerging legal questions related to jurisdiction and standing — and manages all phases of litigation from case assessment through discovery, dispositive motions, settlement, and appeals.

Photo of Ronald I. Raether, Jr. Ronald I. Raether, Jr.

Ron leads the firm’s Privacy + Cyber team. Drawing from nearly 30 years of experience, he provides comprehensive services to companies in all aspects of privacy, security, data use, and risk mitigation. Clients rely on his in-depth understanding of technology and its application

Ron leads the firm’s Privacy + Cyber team. Drawing from nearly 30 years of experience, he provides comprehensive services to companies in all aspects of privacy, security, data use, and risk mitigation. Clients rely on his in-depth understanding of technology and its application to their business to solve their most important challenges — from implementation and strategy to litigation and incident response. Ron and his team have redefined the boundaries of typical law firm privacy and cyber services in offering a 360 degree approach to tackling information governance issues. Their holistic services include drafting and implementing bespoke privacy programs, program implementation, licensing, financing and M&A transactions, incident response, privacy and cyber litigation, regulatory investigations, and enforcement experience.

Photo of Sadia Mirza Sadia Mirza

Sadia leads the firm’s Incidents + Investigations team, advising clients on all aspects of data security and privacy issues. She is the first point of contact when a security incident or data breach is suspected, and plays a central role in her clients’

Sadia leads the firm’s Incidents + Investigations team, advising clients on all aspects of data security and privacy issues. She is the first point of contact when a security incident or data breach is suspected, and plays a central role in her clients’ cybersecurity strategies.